FireEye

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

FireEye, Inc.
Public company
Traded as NASDAQFEYE
Industry Computer security
Founded 2004
Founder Ashar Aziz
Headquarters Milpitas, California, United States
Key people
Kevin Mandia (CEO, Chairman of the Board), Ashar Aziz (Founder, Vice Chairman of the Board, CTO, and Chief Strategy Officer)
Products Network security products
Number of employees
3,600 (2016)
Slogan Next Generation Threat Protection
Website FireEye.com

FireEye, Inc. is a publicly listed US network security company that provides automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. Founded in 2004, the company is headquartered in Milpitas, California. Threat prevention platforms include Network, Email, Endpoint, Mobile, Content, Analytics, and Forensics. FireEye has more than 4,400 customers across 67 countries, including more than 650 of the Forbes Global 2000. FireEye is the first cyber security company awarded certification by the Department of Homeland Security.[1] USAToday says FireEye "has been called in to investigate high-profile attacks against Target, JP Morgan Chase, Sony Pictures, Anthem and others".[2] Yahoo Finance says FireEye is again fastest growing cyber security firm, according to Deloitte.[3]

Foundation

Dave DeWalt, CEO and Chairman of the Board of FireEye in South Korea, in June 2013

In 2004, Ashar Aziz, a Pakistani American, founded FireEye with venture capital provided by Sequoia Capital.[4] Aziz, formerly of Sun Microsystems, is the original inventor of the core set of technologies behind the company's main product line, the FireEye Malware Protection System.[5] In 2006, FireEye launched its first product—a switch-based network access control appliance.[6]

Major investors include Sequoia Capital, Norwest Venture Partners, Icon Ventures, SVB Capital,[7] DAG Ventures, Juniper Networks, and In-Q-Tel.[8]

Expansion

In June 2012, former CEO and President of McAfee, Dave DeWalt, joined FireEye as chairman.[9] DeWalt was appointed CEO in November 2012.[9][10]

On December 30, 2013, FireEye acquired Mandiant in a stock and cash deal worth in excess of $1 billion.[11]

On May 8, 2014, FireEye acquired company nPulse Technologies[12] for approximately $60 million. nPulse is intended to build on FireEye's ability to detect intrusions in a company's network by making it easier to track the intrusion and better understand its effect on the network.[13]

In May 2015, the company raised its revenue forecast for the year to be between $615 million and $635 million.[14]

In May of 2016, it was announced that Dave DeWalt would step down from his position as CEO and become executive chairman on June 15, 2016. DeWalt is replaced by the company's president, Kevin Mandia.[15]

Products and services

Central Management System

The Central Management System (CMS) consolidates the management, reporting, and data sharing of Web MPS, Email MPS, File MPS, and Malware Analysis System (MAS) into a single network-based appliance by acting as a distribution hub for malware security intelligence.[16]

Dynamic Threat Intelligence

The FireEye Cloud crowd-sources Dynamic Threat Intelligence (DTI) detected by individual FireEye MPS appliances, and automatically distributes this time sensitive zero-day intelligence globally to all subscribed customers in frequent updates. Content Updates include a combination of DTI and FireEye Labs generated intelligence identified through Research efforts.

Cyber actions

2008

FireEye was involved in the forensic investigation against the Srizbi botnet in 2008.[17][18]

2009

In October/November 2009, FireEye participated in an effort to take down the Mega-D botnet (also known as Ozdok.)[19]

2011

On March 16, 2011, the Rustock botnet was taken down through an action by Microsoft, US federal law enforcement agents, FireEye, and the University of Washington.[20]

2012

In July 2012, FireEye was involved in analysis[21] of the Grum botnet's command and control servers located in the Netherlands, Panama, and Russia.

2015

In September 2015, FireEye obtained an injunction against a security researcher attempting to report vulnerabilities in FireEye Malware Protection System.[22]

See also

References

  1. Lua error in package.lua at line 80: module 'strict' not found.
  2. Lua error in package.lua at line 80: module 'strict' not found.
  3. Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. Lua error in package.lua at line 80: module 'strict' not found.
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. Lua error in package.lua at line 80: module 'strict' not found.
  8. Lua error in package.lua at line 80: module 'strict' not found.
  9. 9.0 9.1 Lua error in package.lua at line 80: module 'strict' not found.
  10. Lua error in package.lua at line 80: module 'strict' not found.
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. Lua error in package.lua at line 80: module 'strict' not found.
  13. Lua error in package.lua at line 80: module 'strict' not found.
  14. Lua error in package.lua at line 80: module 'strict' not found.
  15. Lua error in package.lua at line 80: module 'strict' not found.
  16. Lua error in package.lua at line 80: module 'strict' not found.
  17. Lua error in package.lua at line 80: module 'strict' not found.
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. Lua error in package.lua at line 80: module 'strict' not found.
  20. Lua error in package.lua at line 80: module 'strict' not found.
  21. Lua error in package.lua at line 80: module 'strict' not found.
  22. Lua error in package.lua at line 80: module 'strict' not found.

External links